answersLogoWhite

0

Most commonly this is done via mIRC (internet Relay Chat) where bot nets are controlled. For example, where the clients communicate w/ the zombie (infected computers). Typically lazy hackers will just run an IRC bot spamming some stupid message that will infect the mIRC chat script the user is running who is tricked into clicking a link etc. You don't recruit a Zombie, you maliciously infect someones computer w/o their consent and this is illegal.

It all boils down to the fact that you need to get a Trojan on their PC to connect the PC to one of your clients in order to send commands and have a two way connection to the victims computer.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

Which threat to security uses traffic from zombie computers to overwhelm servers?

DDoS


When hackers use zombie computers to launch an attack on another computer or website the attack is know as what?

distributed denial-of-service attack or known as DDoS


Advantages and disadvantages of zombie computers?

Unless you're the hacker in control of the zombie, there is no advantage. Disadvantages include: * Losing partial or complete control of your computer. * Contributing to spam, DDoS attacks, and any number of computer related crimes. * Being blamed for the above actions.


Can you DDoS the entire internet?

No you can't, you just do not have enough resources for that. It does not matter how much infected computers you have, the number of computers in internet is more. And because for DDoS requirements (many computers sending requests to one particular adddress) you have to have all internet infected, nobody can do that.


What kind of virus floods computers with requests unil it shuts down?

A DDoS attack


What is a large group of software programs that run autonomously on zombie computers is called?

zombie


An attacker sends a large number of requests to a server from several computers that are located at different geographical locations What is the name for this type of attack?

DDoS


What is a group of zombie computers that are connected through backdoors called?

Botnet


Should the owners of the zombie computers be fined as a means of encouraging people to to better safeguard their computers?

yes hehehe<3


What are zombie computers and how can they affect network?

Zombie computers are any system attached to a network that silently (unannounced to the user) perform tasks on the network to reach a predetermined goal. A computer system can become a zombie computer by being infected via a network transferable source such as via email, or via a local source delivered from a flash drive or other external source. It is most common for each zombie computer to be performing a small portion of the larger goal, and be part of a larger group of zombie computers that are all working together for the same purpose. This way, if one zombie computer is brought offline, the goal can still be reached. It also ensures that each infected system is not diverting a great deal of resources to the zombie process, which helps to ensure the zombie node is not detected and repaired. Network consequences are dependent on what the task is that the zombie collective is working on, and how many zombie nodes are contributing vs the scale of the network they sit on. For example, if 10 systems on a network of 10,000 systems are infected, the likelihood of the network being bogged down by the zombie traffic is minimal. However, it also depends on whether the goal the zombie collective is trying to achieve is targeting the local network they are on, or something outside the network on the internet, as 10 computers working to overload a local server, may achieve some results, while 10 computers trying to overload Google for instance would have little effect.


How do i cancel this?

How do I cancel my membership


How do you make a ddos?

Buy a botnet.